Software Supply Chain Attacks are Skyrocketing

Global supply chain issues continue to persist to the point that they are circumventing earlier predictions that they would begin easing by now. They are getting worse, not better, due in part to prolonged Covid-19 lockdowns in parts of China and Russia’s invasion of Ukraine, which cut off their exports.

This is no small thing given that Ukraine is a major global supplier of foodstuffs and the world’s leading source of neon, a gas needed for the lasers used in the chip-making process – and the last thing needed in the already supply-constrained semiconductor industry.

As significant as these supply chain issues are, yet another big one is now coming to the forefront – software-based supply chain attacks. These garner far less attention even though they distribute substantially more pain than other types of cyberattacks.

According to a study by Argon Security, an Israeli cybersecurity firm that specializes in protecting the integrity of the software supply chain, software supply chain attacks grew by more than 300 percent in 2021 in comparison to 2020. And another recent study of more than 400 IT executives and managers by Anchore Enterprise, a California-based developer of a security-centric software supply chain management platform, found that three in five companies last year were targeted by software supply chain attacks.

A supply chain attack, also known as a third-party attack, occurs when hackers infiltrate an organization’s system through an outside partner or provider with poor security practices and access to its systems and data. More suppliers and service providers are touching sensitive data than ever, dramatically expanding the attack surface of most enterprises in recent years. Any company that produces software or hardware for other organizations is a potential target of attackers.

Cybercriminals are increasingly targeting software supply chains because these attacks allow them to compromise hundreds or thousands of victims through a single breach, while simultaneously affording them extensive internal access in the systems. Any breach can be damaging, of course, but a supply chain attack often is far worse because it frequently has a higher level of access to the network. Hackers can also be harder to detect.

One major example of a software supply chain breach last summer involved Kaseya, a leading provider of IT and security management solutions for managed services providers (MSPs) and small and medium-sized businesses. Hackers found a flaw in the company’s remote management software, enabling them to spread ransomware through the company’s software update processes and ultimately to the end users of the product. Up to 1,500 business were impacted. Similar attacks have occurred through other widely used software products, such as those provided by SolarWinds and Microsoft Exchange.

The SolarWinds incident in December 2020, believed to be a nation-state attack on thousands of government and corporate networks, was typical in that most software supply chain assaults target companies as an inroad to more valuable targets. If successful, the backdoor of a huge enterprise network is opened wide and, frequently, an entire supply chain as well.

Because supply chain attacks break into vulnerable, often smaller companies as a means to break into much bigger organizations, the disheartening upshot is that a company’s security no longer depends solely on its own resilience.

It’s no surprise, then, that successful supply chain attacks are distressingly common. According to BlueVoyant, a New York-based cybersecurity company, more than 80 percent of sizable organizations have experienced a data breach in recent years as a result of security vulnerabilities in their supply chains. The penetration rate is as high as it is, concludes BlueVoyant research, because the average big company has, on average, more than 1,000 vendors in its supply ecosystem.

Another growing problem is a new type of software supply chain attack that infiltrates open-source software, which, historically, has contained numerous security vulnerabilities.

According to Sonatype, a software analytics company that evaluates the security of corporate codebases, the number of such attacks exploded more than six-fold in 2021. (Some good news here is that the increasing number of such attacks may decline this year as software developers work harder to update and better protect their open-source software components.)

To help mitigate these and other software supply chain issues, organizations should stop using security technology that relies on hallmarks of previously encountered threats to try to stop the next attack. This approach leaves companies open to attacks that use new infrastructure and new techniques with as-yet unknown signatures.

Minimizing the risk of a software supply chain attack also requires a never-ending loop of risk and compliance management. Some attacks may still get through, but fewer – and that’s a step in the right direction. To this end, here are some tips.

+ Know your software. Keep a thorough inventory of all open source and proprietary off-the-shelf tools used by your organization. You can’t protect what you don’t know you have.

+ Ask prospective vendors for compliance verifications. This then requires your team to verify the existence and proper functioning of all required security processes and controls used by the vendor to protect their equipment, data and systems. Also ask your vendor to walk you through each step in their supply chain to maintain the required level of security throughout the supply chain journey.

+ Keep an eye out for known vulnerabilities and apply the appropriate software patches. This is crucial because hackers use automated tools to constantly scan millions of connected devices that haven’t applied patches against vulnerabilities. New updates respond to new threats.

+ Use access controls and two-factor authentication to heighten security. Also run security software with multiple layers of protection.

Lastly, users’ right of access to data should be limited to the minimum level necessary and the efficient use of various technologies should be checked regularly. Too many companies use multiple tools to manage the same things. They don’t appreciate that the greater the sprawl, the faster security controls collide and decay.

.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3